<html xmlns="http://www.w3.org/1999/xhtml"><head></head><body><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="1" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[1]</anchor-end> <cite xml:lang="ja-JP">中間CA証明書に関して | SSL・電子証明書ならGMOグローバルサイン</cite>
(<time>2015-04-03 01:16:35 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://jp.globalsign.com/support/faq/58.html">https://jp.globalsign.com/support/faq/58.html</anchor-external></figcaption><blockquote><p>グローバルサインのサーバ証明書はセキュリティ上の理由等により3階層(EV証明書は4階層)の証明書を発行しています。</p></blockquote></figure><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="2" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[2]</anchor-end> <cite>Apacheでの中間証明書の扱い - あるシステム管理者の日常</cite>
(<time>2015-03-26 10:14:25 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://d.hatena.ne.jp/rougeref/20140418">http://d.hatena.ne.jp/rougeref/20140418</anchor-external></p><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="3" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[3]</anchor-end> <cite xml:lang="ja-JP">高木浩光@自宅の日記 - 第六種オレオレ証明書が今後増加するおそれ, 訂正(15日)</cite>
(<anchor xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:">高木浩光</anchor> 著, <time>2011-04-28 08:21:26 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://takagi-hiromitsu.jp/diary/20071212.html">http://takagi-hiromitsu.jp/diary/20071212.html</anchor-external></figcaption><blockquote><p>これらはどちらも、中間認証局から取得したサーバ証明書なのに、中間認証局の証明書をサーバに設置していないという、第六種オレオレ証明書の状態になっているようだ。</p><p>この場合、Internet Explorerアクセスするとオレオレ警告が出ないため、サーバ管理者が気づいていないのだと思われる。</p></blockquote></figure><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="4" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[4]</anchor-end> <cite xml:lang="en">399045 – PSM should remember valid intermediate CA certificates</cite>
(<time>2015-04-03 01:29:38 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://bugzilla.mozilla.org/show_bug.cgi?id=399045">https://bugzilla.mozilla.org/show_bug.cgi?id=399045</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="5" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[5]</anchor-end> <cite xml:lang="ja">トルコの認証局、手違いで中間CA証明書を発行。早速攻撃に使われる | スラッシュドット・ジャパン セキュリティ</cite>
(<time>2015-04-03 01:30:58 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://security.slashdot.jp/story/13/01/09/0755203/">http://security.slashdot.jp/story/13/01/09/0755203/</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="6" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[6]</anchor-end> <cite>多段の中間CA証明書作成 -証明書作成編- - HDEラボ</cite>
(<time>2011-08-02 11:30:42 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://lab.hde.co.jp/2008/09/ca.html">http://lab.hde.co.jp/2008/09/ca.html</anchor-external></p><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="7" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[7]</anchor-end> (<time>2014-11-01 05:54:38 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://cabforum.org/wp-content/uploads/BRv1.2.3.pdf#page=12">https://cabforum.org/wp-content/uploads/BRv1.2.3.pdf#page=12</anchor-external></figcaption><blockquote><p>Subordinate CA: A Certification Authority whose Certificate is signed by the Root CA, or another Subordinate</p><p>CA.</p></blockquote></figure><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="8" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[8]</anchor-end> <cite xml:lang="en">Microsoft Root Certificate Program</cite>
(<time>2015-04-06 23:19:23 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://technet.microsoft.com/en-us/library/cc751157.aspx">https://technet.microsoft.com/en-us/library/cc751157.aspx</anchor-external></figcaption><blockquote><p>The Program is responsible for updating root certificates only. Intermediate certificates included in Windows today are purely for legacy reasons. Managing the distribution of intermediate certificates for all CAs in the root program is not scalable since CAs frequently add and remove intermediate CAs for business and lifecycle reasons.</p></blockquote></figure><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="9" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[9]</anchor-end> <cite xml:lang="ja"><anchor xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:">中間証明書</anchor>のないサーバにアクセスする - 詩と創作・思索のひろば</cite>, <time>2021-06-22T02:41:44.000Z</time> <anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://motemen.hatenablog.com/entry/2020/04/save-intermediate-certs">https://motemen.hatenablog.com/entry/2020/04/save-intermediate-certs</anchor-external></p></body></html>